Category Archives: Contingency Planning

Cyberwarfare … Back(up) to Basics

– It seems that some folks are talking about reverting to former manual or analog methods should current cyber systems be compromised through cyberattacks by hostile nation states, terrorists or criminal groups. But, as we quickly found out when we were creating Y2K contingency plans, it isn’t…

Catastrophes and Information Security Risk

– The world has certainly experienced its share of natural catastrophes over the past few months—major hurricanes, extensive flooding, powerful earthquakes, record-breaking wildfires—as well as manmade tragedies—mass shootings, vehicles driven into crowds, refugees escaping from warring…

Cybersecurity’s “Forward to the Past”

– On June 21, 2017, Congress received a letter from 103 eminent cybersecurity experts and researchers (the list was compiled by NEDC (The National Election Defense Coalition) and partners) about reducing election hacking risks. You can link to the letter via Zack Wittaker’s article “Security…

Safety and the Airbag Supply Chain

– It came as quite a surprise to read that Toyota, Volkswagen, Fiat Chrysler, Mitsubishi and possibly other automakers “continue to sell new vehicles with defective Takata airbags” … see Hiroko Tabuchi’s article, “Airbags with Flaws Still Used in New Cars,” on the first Business Day page…

Supply Chains Mean (Cyber) War

– Author’s note: Since this column was originally written, another “scandal” broke around the use by third-party suppliers of North Korean gold, affecting such companies as Hewlett-Packard Co. and IBM, as described by Joel Schectman in the Risk & Compliance Journal section of The Wall…